husy394 / rpms / kernel

Forked from rpms/kernel 3 years ago
Clone
bd6ab2
Note:  this bug was taken from Commit-ID: 26c2d2b39128adba276d140eefa2745591b88536
bd6ab2
and corrected for white space differences between the RHEL-7.1 3.10.0-229 upstream 
bd6ab2
kernel.
bd6ab2
---
bd6ab2
diff -uNrp a/arch/x86/kernel/entry_32.S b/arch/x86/kernel/entry_32.S
bd6ab2
--- a/arch/x86/kernel/entry_32.S	2015-05-17 07:39:14.371778177 -0500
bd6ab2
+++ b/arch/x86/kernel/entry_32.S	2015-05-17 07:36:13.654610869 -0500
bd6ab2
@@ -457,15 +457,14 @@ sysenter_exit:
bd6ab2
 sysenter_audit:
bd6ab2
 	testl $(_TIF_WORK_SYSCALL_ENTRY & ~_TIF_SYSCALL_AUDIT),TI_flags(%ebp)
bd6ab2
 	jnz syscall_trace_entry
bd6ab2
-	addl $4,%esp
bd6ab2
-	CFI_ADJUST_CFA_OFFSET -4
bd6ab2
-	movl %esi,4(%esp)		/* 5th arg: 4th syscall arg */
bd6ab2
-	movl %edx,(%esp)		/* 4th arg: 3rd syscall arg */
bd6ab2
-	/* %ecx already in %ecx		   3rd arg: 2nd syscall arg */
bd6ab2
-	movl %ebx,%edx			/* 2nd arg: 1st syscall arg */
bd6ab2
-	/* %eax already in %eax		   1st arg: syscall number */
bd6ab2
+	/* movl PT_EAX(%esp), %eax        already set, syscall number: 1st arg to audit */
bd6ab2
+	movl PT_EBX(%esp), %edx                /* ebx/a0: 2nd arg to audit */
bd6ab2
+ 	/* movl PT_ECX(%esp), %ecx        already set, a1: 3nd arg to audit */
bd6ab2
+	pushl_cfi PT_ESI(%esp)                /* a3: 5th arg */
bd6ab2
+	pushl_cfi PT_EDX+4(%esp)        /* a2: 4th arg */
bd6ab2
 	call __audit_syscall_entry
bd6ab2
-	pushl_cfi %ebx
bd6ab2
+	popl_cfi %ecx /* get that remapped edx off the stack */
bd6ab2
+	popl_cfi %ecx /* get that remapped esi off the stack */
bd6ab2
 	movl PT_EAX(%esp),%eax		/* reload syscall number */
bd6ab2
 	jmp sysenter_do_call
bd6ab2
 
bd6ab2
---